Showing 3,641 - 3,660 results of 5,943 for search '"securities"', query time: 0.06s Refine Results
  1. 3641
  2. 3642

    The Division of Marital Joint Property: Legal Framework and Gender Implications in North Macedonia by Metaj-Stojanova Albana

    Published 2024-12-01
    “…Women, especially those who have forgone paid employment to fulfill domestic roles, face significant challenges in securing an equal share of marital property.…”
    Get full text
    Article
  3. 3643

    Mathematical Modeling of Static Data Attribute Encryption Based on Big Data Technology by Yutang Liu, Qin Zhang

    Published 2022-01-01
    “…In order to improve the attributes of static data, encryption technology can provide a reliable technical guarantee for network security. This paper presents a mathematical modeling method of static data attribute encryption based on big data technology. …”
    Get full text
    Article
  4. 3644

    The Application and Analysis of Emotion Recognition Based on Modern Technology by Bi Lanxin

    Published 2025-01-01
    “…Despite the growing application of emotion recognition technology across various fields, including healthcare, traffic safety, and security, there remain significant challenges related to accuracy, robustness, and privacy. …”
    Get full text
    Article
  5. 3645

    MILITARY INTERVENTIONSAND THE NIGERIA FOURTH REPUBLIC: A REFLECTION DISCOURSE by Stella Ughulu Eghoikhunu, Ihaza Kayode

    Published 2023-08-01
    “…The study recommends that there should be a conscious effort on the part of leaders of the nation to improve the socio-economic development of the country and more funding and training of the agencies/forces responsible for internal security. …”
    Get full text
    Article
  6. 3646
  7. 3647
  8. 3648

    Enhanced Invisibility and Robustness of Digital Image Watermarking Based on DWT-SVD by Ali Alzahrani

    Published 2022-01-01
    “…In research, a system is being developed to handle veracious types of watermarked attacks, for obtaining extreme security and an adequate level of visibility and robustness. …”
    Get full text
    Article
  9. 3649
  10. 3650

    Éclairages foucaldiens sur l’incrimination du déisme et de la libre pensée dans la jeune République américaine by Auréliane Narvaez

    Published 2022-12-01
    “…Undermining deism thus hinged on security and sanitary discourses that associated religious infidelity with anarchy, criminality, and even insanity. …”
    Get full text
    Article
  11. 3651

    « Faire un tri dans le monde des applis » by Esteban Bopp, Johnny Douvinet, Damien Serre

    Published 2018-12-01
    “…Results obtained on 50 applications deployed in France show that most of them do no achieve the objectives of the alert, in the sense defined by civil security, due to a single-hazard approach, a unique sense of communication, and a low participation of the smartphone users. …”
    Get full text
    Article
  12. 3652

    The state makes migration—and migration makes the state? by Lorenzo Ghione

    Published 2024-12-01
    “…Through a securitised and politicised migration management, the Tunisian regime has secured substantial financial support from Europe while portraying immigrants as domestic threats has legitimised its increasingly autocratic policies. …”
    Get full text
    Article
  13. 3653
  14. 3654

    The enigma of validity: Speculations on the last paragraph of Donner le temps II by Rezende Gabriel

    Published 2024-01-01
    “…Validity, as the mystical foundation of normativity, functions simultaneously as a metaphysical shortcut to secure self-reference in philosophical thought and as the impossibility of any foundational grounding (Grundlegung).…”
    Get full text
    Article
  15. 3655
  16. 3656

    Enhancing drought tolerance in horticultural plants through plant hormones: a strategic coping mechanism by Shanxia Huang, Songheng Jin

    Published 2025-01-01
    “…The development of effective strategies to mitigate drought stress is essential for sustainable agriculture and food security, especially considering the continuous growth of the world population. …”
    Get full text
    Article
  17. 3657

    A Comprehensive Review: Interaction of Appearance and Behavior, Artificial Skin, and Humanoid Robot by Nguyen Minh Trieu, Nguyen Truong Thinh

    Published 2023-01-01
    “…Recent research on humanoid robots is designed to appear to be copies of the anthropometric indicators of real people, which may affect the security of other people’s identities. Besides, these robots cause a feeling of horror in the user if their appearance is in the position of the uncanny valley. …”
    Get full text
    Article
  18. 3658

    Organizing Coastal Land Use for Urban Tourism Development (Case Study: Sorkhrood) by mehdi razjouyan, sadralddin motavali, gholamreza janbaz ghobadi

    Published 2020-06-01
    “…The results of this research show that from the perspective of half of the officials and government experts, the expansion of tourism industry, on one hand, causes the region's economic prosperity and, on the other hand, reduces regional security and causes pollution of the environment.…”
    Get full text
    Article
  19. 3659

    « You don’t suspect me of doing anything wrong, do you ? » Peurs, soupçons et paranoïa dans The Woman in White de Wilkie Collins by Laurence Taleirach-Vielmas

    Published 2008-12-01
    “…From mere domestic secrets to anxieties related to national security, Collins describes a modern world ruled by suspicions, and constructs his characters as paranoid patients.…”
    Get full text
    Article
  20. 3660

    Motivators for using on-demand vehicle sharing services in Brazil by Fábio Violin

    Published 2021-01-01
    “…The five major regions of Brazil were considered in this research, totaling 2150 interviews, indicating the existence of fourteen motivators for use involving the economic, social, environmental, and technological dimensions, however, only six variables comprise the structuring nucleus of demand and are based on an element of economic order (Reduced Tariff), one of a socioeconomic nature (Expectation of Benefits) and four technological drivers (Technological Availability, Convenience of Time and Boarding in addition to Data Security), which figure as utilitarian indicators, corroborating the results of international studies and contrasting those that signal hedonistic elements as relevant. …”
    Get full text
    Article